How to use update_secret method in localstack

Best Python code snippet using localstack_python

iam_user.py

Source:iam_user.py Github

copy

Full Screen

...77 def tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):78 pulumi.set(self, "tags", value)79 @property80 @pulumi.getter(name="updateSecret")81 def update_secret(self) -> Optional[pulumi.Input[bool]]:82 """83 Rotate Minio User Secret Key84 """85 return pulumi.get(self, "update_secret")86 @update_secret.setter87 def update_secret(self, value: Optional[pulumi.Input[bool]]):88 pulumi.set(self, "update_secret", value)89@pulumi.input_type90class _IamUserState:91 def __init__(__self__, *,92 disable_user: Optional[pulumi.Input[bool]] = None,93 force_destroy: Optional[pulumi.Input[bool]] = None,94 name: Optional[pulumi.Input[str]] = None,95 secret: Optional[pulumi.Input[str]] = None,96 status: Optional[pulumi.Input[str]] = None,97 tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,98 update_secret: Optional[pulumi.Input[bool]] = None):99 """100 Input properties used for looking up and filtering IamUser resources.101 :param pulumi.Input[bool] disable_user: Disable user102 :param pulumi.Input[bool] force_destroy: Delete user even if it has non-Terraform-managed IAM access keys103 :param pulumi.Input[bool] update_secret: Rotate Minio User Secret Key104 """105 if disable_user is not None:106 pulumi.set(__self__, "disable_user", disable_user)107 if force_destroy is not None:108 pulumi.set(__self__, "force_destroy", force_destroy)109 if name is not None:110 pulumi.set(__self__, "name", name)111 if secret is not None:112 pulumi.set(__self__, "secret", secret)113 if status is not None:114 pulumi.set(__self__, "status", status)115 if tags is not None:116 pulumi.set(__self__, "tags", tags)117 if update_secret is not None:118 pulumi.set(__self__, "update_secret", update_secret)119 @property120 @pulumi.getter(name="disableUser")121 def disable_user(self) -> Optional[pulumi.Input[bool]]:122 """123 Disable user124 """125 return pulumi.get(self, "disable_user")126 @disable_user.setter127 def disable_user(self, value: Optional[pulumi.Input[bool]]):128 pulumi.set(self, "disable_user", value)129 @property130 @pulumi.getter(name="forceDestroy")131 def force_destroy(self) -> Optional[pulumi.Input[bool]]:132 """133 Delete user even if it has non-Terraform-managed IAM access keys134 """135 return pulumi.get(self, "force_destroy")136 @force_destroy.setter137 def force_destroy(self, value: Optional[pulumi.Input[bool]]):138 pulumi.set(self, "force_destroy", value)139 @property140 @pulumi.getter141 def name(self) -> Optional[pulumi.Input[str]]:142 return pulumi.get(self, "name")143 @name.setter144 def name(self, value: Optional[pulumi.Input[str]]):145 pulumi.set(self, "name", value)146 @property147 @pulumi.getter148 def secret(self) -> Optional[pulumi.Input[str]]:149 return pulumi.get(self, "secret")150 @secret.setter151 def secret(self, value: Optional[pulumi.Input[str]]):152 pulumi.set(self, "secret", value)153 @property154 @pulumi.getter155 def status(self) -> Optional[pulumi.Input[str]]:156 return pulumi.get(self, "status")157 @status.setter158 def status(self, value: Optional[pulumi.Input[str]]):159 pulumi.set(self, "status", value)160 @property161 @pulumi.getter162 def tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:163 return pulumi.get(self, "tags")164 @tags.setter165 def tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):166 pulumi.set(self, "tags", value)167 @property168 @pulumi.getter(name="updateSecret")169 def update_secret(self) -> Optional[pulumi.Input[bool]]:170 """171 Rotate Minio User Secret Key172 """173 return pulumi.get(self, "update_secret")174 @update_secret.setter175 def update_secret(self, value: Optional[pulumi.Input[bool]]):176 pulumi.set(self, "update_secret", value)177class IamUser(pulumi.CustomResource):178 @overload179 def __init__(__self__,180 resource_name: str,181 opts: Optional[pulumi.ResourceOptions] = None,182 disable_user: Optional[pulumi.Input[bool]] = None,183 force_destroy: Optional[pulumi.Input[bool]] = None,184 name: Optional[pulumi.Input[str]] = None,185 secret: Optional[pulumi.Input[str]] = None,186 tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,187 update_secret: Optional[pulumi.Input[bool]] = None,188 __props__=None):189 """190 ## Example Usage191 ```python192 import pulumi193 import pulumi_minio as minio194 test_iam_user = minio.IamUser("testIamUser",195 force_destroy=True,196 tags={197 "tag-key": "tag-value",198 })199 pulumi.export("test", test_iam_user.id)200 pulumi.export("status", test_iam_user.status)201 pulumi.export("secret", test_iam_user.secret)202 ```203 :param str resource_name: The name of the resource.204 :param pulumi.ResourceOptions opts: Options for the resource.205 :param pulumi.Input[bool] disable_user: Disable user206 :param pulumi.Input[bool] force_destroy: Delete user even if it has non-Terraform-managed IAM access keys207 :param pulumi.Input[bool] update_secret: Rotate Minio User Secret Key208 """209 ...210 @overload211 def __init__(__self__,212 resource_name: str,213 args: Optional[IamUserArgs] = None,214 opts: Optional[pulumi.ResourceOptions] = None):215 """216 ## Example Usage217 ```python218 import pulumi219 import pulumi_minio as minio220 test_iam_user = minio.IamUser("testIamUser",221 force_destroy=True,222 tags={223 "tag-key": "tag-value",224 })225 pulumi.export("test", test_iam_user.id)226 pulumi.export("status", test_iam_user.status)227 pulumi.export("secret", test_iam_user.secret)228 ```229 :param str resource_name: The name of the resource.230 :param IamUserArgs args: The arguments to use to populate this resource's properties.231 :param pulumi.ResourceOptions opts: Options for the resource.232 """233 ...234 def __init__(__self__, resource_name: str, *args, **kwargs):235 resource_args, opts = _utilities.get_resource_args_opts(IamUserArgs, pulumi.ResourceOptions, *args, **kwargs)236 if resource_args is not None:237 __self__._internal_init(resource_name, opts, **resource_args.__dict__)238 else:239 __self__._internal_init(resource_name, *args, **kwargs)240 def _internal_init(__self__,241 resource_name: str,242 opts: Optional[pulumi.ResourceOptions] = None,243 disable_user: Optional[pulumi.Input[bool]] = None,244 force_destroy: Optional[pulumi.Input[bool]] = None,245 name: Optional[pulumi.Input[str]] = None,246 secret: Optional[pulumi.Input[str]] = None,247 tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,248 update_secret: Optional[pulumi.Input[bool]] = None,249 __props__=None):250 opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)251 if not isinstance(opts, pulumi.ResourceOptions):252 raise TypeError('Expected resource options to be a ResourceOptions instance')253 if opts.id is None:254 if __props__ is not None:255 raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')256 __props__ = IamUserArgs.__new__(IamUserArgs)257 __props__.__dict__["disable_user"] = disable_user258 __props__.__dict__["force_destroy"] = force_destroy259 __props__.__dict__["name"] = name260 __props__.__dict__["secret"] = secret261 __props__.__dict__["tags"] = tags262 __props__.__dict__["update_secret"] = update_secret263 __props__.__dict__["status"] = None264 super(IamUser, __self__).__init__(265 'minio:index/iamUser:IamUser',266 resource_name,267 __props__,268 opts)269 @staticmethod270 def get(resource_name: str,271 id: pulumi.Input[str],272 opts: Optional[pulumi.ResourceOptions] = None,273 disable_user: Optional[pulumi.Input[bool]] = None,274 force_destroy: Optional[pulumi.Input[bool]] = None,275 name: Optional[pulumi.Input[str]] = None,276 secret: Optional[pulumi.Input[str]] = None,277 status: Optional[pulumi.Input[str]] = None,278 tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,279 update_secret: Optional[pulumi.Input[bool]] = None) -> 'IamUser':280 """281 Get an existing IamUser resource's state with the given name, id, and optional extra282 properties used to qualify the lookup.283 :param str resource_name: The unique name of the resulting resource.284 :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.285 :param pulumi.ResourceOptions opts: Options for the resource.286 :param pulumi.Input[bool] disable_user: Disable user287 :param pulumi.Input[bool] force_destroy: Delete user even if it has non-Terraform-managed IAM access keys288 :param pulumi.Input[bool] update_secret: Rotate Minio User Secret Key289 """290 opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))291 __props__ = _IamUserState.__new__(_IamUserState)292 __props__.__dict__["disable_user"] = disable_user293 __props__.__dict__["force_destroy"] = force_destroy294 __props__.__dict__["name"] = name295 __props__.__dict__["secret"] = secret296 __props__.__dict__["status"] = status297 __props__.__dict__["tags"] = tags298 __props__.__dict__["update_secret"] = update_secret299 return IamUser(resource_name, opts=opts, __props__=__props__)300 @property301 @pulumi.getter(name="disableUser")302 def disable_user(self) -> pulumi.Output[Optional[bool]]:303 """304 Disable user305 """306 return pulumi.get(self, "disable_user")307 @property308 @pulumi.getter(name="forceDestroy")309 def force_destroy(self) -> pulumi.Output[Optional[bool]]:310 """311 Delete user even if it has non-Terraform-managed IAM access keys312 """313 return pulumi.get(self, "force_destroy")314 @property315 @pulumi.getter316 def name(self) -> pulumi.Output[str]:317 return pulumi.get(self, "name")318 @property319 @pulumi.getter320 def secret(self) -> pulumi.Output[str]:321 return pulumi.get(self, "secret")322 @property323 @pulumi.getter324 def status(self) -> pulumi.Output[str]:325 return pulumi.get(self, "status")326 @property327 @pulumi.getter328 def tags(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:329 return pulumi.get(self, "tags")330 @property331 @pulumi.getter(name="updateSecret")332 def update_secret(self) -> pulumi.Output[Optional[bool]]:333 """334 Rotate Minio User Secret Key335 """...

Full Screen

Full Screen

key_schedule.py

Source:key_schedule.py Github

copy

Full Screen

...79 def set_init_secret(self, init_secret: bytes):80 self._init_secret = init_secret81 def get_init_secret(self) -> bytes:82 return self._init_secret83 def get_update_secret(self) -> bytes:84 return self._update_secret85 def get_epoch_secret(self) -> bytes:86 return self._epoch_secret87 def get_sender_data_secret(self) -> bytes:88 return self._sender_data_secret89 def get_handshake_secret(self) -> bytes:90 return self._handshake_secret91 def get_application_secret(self) -> bytes:92 return self._application_secret93 def get_confirmation_key(self) -> bytes:94 return self._confirmation_key95def advance_epoch(context: GroupContext, key_schedule: KeySchedule, update_secret: bytes):96 """97 Advances the Key Schedule to a new epoch...

Full Screen

Full Screen

update_secret.py

Source:update_secret.py Github

copy

Full Screen

...12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.13# See the License for the specific language governing permissions and14import argparse15# [START secretmanager_update_secret]16def update_secret(project_id, secret_id):17 """18 Update the metadata about an existing secret.19 """20 # Import the Secret Manager client library.21 from google.cloud import secretmanager22 # Create the Secret Manager client.23 client = secretmanager.SecretManagerServiceClient()24 # Build the resource name of the secret.25 name = client.secret_path(project_id, secret_id)26 # Update the secret.27 secret = {'name': name, 'labels': {'secretmanager': 'rocks'}}28 update_mask = {'paths': ['labels']}29 response = client.update_secret(secret, update_mask)30 # Print the new secret name.31 print('Updated secret: {}'.format(response.name))32 # [END secretmanager_update_secret]33 return response34if __name__ == '__main__':35 parser = argparse.ArgumentParser(36 description=__doc__,37 formatter_class=argparse.RawDescriptionHelpFormatter)38 parser.add_argument('project_id', help='id of the GCP project')39 parser.add_argument('--secret-id', required=True)40 args = parser.parse_args()...

Full Screen

Full Screen

Automation Testing Tutorials

Learn to execute automation testing from scratch with LambdaTest Learning Hub. Right from setting up the prerequisites to run your first automation test, to following best practices and diving deeper into advanced test scenarios. LambdaTest Learning Hubs compile a list of step-by-step guides to help you be proficient with different test automation frameworks i.e. Selenium, Cypress, TestNG etc.

LambdaTest Learning Hubs:

YouTube

You could also refer to video tutorials over LambdaTest YouTube channel to get step by step demonstration from industry experts.

Run localstack automation tests on LambdaTest cloud grid

Perform automation testing on 3000+ real desktop and mobile devices online.

Try LambdaTest Now !!

Get 100 minutes of automation test minutes FREE!!

Next-Gen App & Browser Testing Cloud

Was this article helpful?

Helpful

NotHelpful